ESET Research


2223 articles

Cybercrime

Is this how Indonesia topped the malicious traffic charts?

Is this how Indonesia topped the malicious traffic charts?

Cybercrime

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Lysa Myers23 Oct 2013


Malware

Solutions to current antivirus challenges

Solutions to current antivirus challenges

Malware

Solutions to current antivirus challenges

The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?

Peter Stancik19 Oct 2013


Malware

A prompt to save the world: new security features against malware in AutoCAD

A prompt to save the world: new security features against malware in AutoCAD

Malware

A prompt to save the world: new security features against malware in AutoCAD

Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.

Sebastián Bortnik17 Oct 2013


Malware

Win32/KanKan - Chinese drama

Win32/KanKan - Chinese drama

Malware

Win32/KanKan - Chinese drama

In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities - and discuss the evidence that Xunlei Networking Technologies is implicated.

Joan Calvet11 Oct 2013


ESET Research

Win32/Napolar – A new bot on the block

Win32/Napolar – A new bot on the block

ESET Research

Win32/Napolar – A new bot on the block

There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of malware came to our attention mid-August because of its interesting anti-debugging and code injection techniques.

Pierre-Marc Bureau25 Sep 2013


Ransomware

Filecoder: Holding your data to ransom

Filecoder: Holding your data to ransom

Ransomware

Filecoder: Holding your data to ransom

Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new. We’ve noted a significant increase in Filecoder activity over the past few summer months - in this blog post we address the questions we’re getting about this issue.

Robert Lipovsky23 Sep 2013


ESET Research

Known unknowns - detecting rootkits under OS X

Known unknowns - detecting rootkits under OS X

ESET Research

Known unknowns - detecting rootkits under OS X

We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right now. We know that we don’t know. Today, ESET is releasing a simple tool to detect rootkits on OS X.

Marc-Etienne M.Léveillé23 Sep 2013


Malware

Hesperbot - technical analysis: part 2/2

Hesperbot - technical analysis: part 2/2

Malware

Hesperbot - technical analysis: part 2/2

In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network traffic interception.

Robert Lipovsky09 Sep 2013


Malware

Hesperbot – Technical analysis part 1/2

Hesperbot – Technical analysis part 1/2

Malware

Hesperbot – Technical analysis part 1/2

Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. For more information about its malware spreading campaigns and victims, refer to our first blog post. In this post we’ll cover the technical details of the malware, including the overall architecture, as well as the mobile component.

Robert Lipovsky06 Sep 2013